SlideShare una empresa de Scribd logo
1 de 14
UNIVERSITY OF SORAN
Faculty of science & engineering
School of engineering
DPT of petroleum engineering
VIRUS
Prepared by:
Harem Abdullstar
Rebaz Abdullqadr
Omer Muhammed
Supervisor :
Mr. Aras Masoud
Contents?
what's a computer virus ?
Types of Viruses
Categories of Viruses
How do viruses work?
How an Antivirus works?
Conclusion
What is a virus?
A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
The computer viruses can damage or
corrupt data, modify existing data .
Types of virus
Boot sector Virus
Master Boot Record virus (MBR)
File infector virus
 Multipartite virus
 Macro Virus
Trojan Horse
 Worms
Logic Bombs
Polymorphic Virus
Boot sector Virus
 A boot sector virus infects boot sector of
computers. During system boot, boot
sector virus is loaded into main memory
and destroys data stored in hard disk.
E.g. Form, Disk
Killer, Michelangelo, Stoned.
Master Boot Record virus (MBR)
MBR viruses are memory-resident viruses
that infect disks in the same manner as
boot sector viruses.
E.g. AntiEXE, Unashamed, NYB
File infector virus
File infector viruses infect program files.
Normally infect executable code, such as
.COM, .SYS, .BAT and .EXE files.
E.g. Snow.A, Jerusalem, Cascade
Multipartite virus
A multipartite virus is a virus that can infect either
boot sectors or executables.
When it infects a boot sector, it works as a boot
sector infector.
E.g. One_Half, Emperor, Anthrax, Tequilla.
Macro Virus
Macro viruses infect files that are created using
certain applications or programs that contain
macros.
They infect documents created from Microsoft
Office Word, Excel, PowerPoint and Access files.
E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M.
Groov.
Trojan Horse
A Trojan horse is a computer program that is
hiding a virus or other potentially damaging
program.
Trojan horses can be included in software that
you download for free or as attachments in
email messages.
E.g. Trojan.Vundo. Back
Orifice, NetBus, SubSeven
Worms
A computer worm is a self-replicating computer
program. It uses a network to send copies of
itself to other and it may do so without any user
intervention.
Work of worms
delete files on a host system
send documents via email
E.g.W32.Mydoom.AX@mm
How do viruses work?
Replicating itself
Interrupting system/network use
Modifying configuration settings
Flashing BIOS
Format hard drive/destroy data
Using computer/network resources
How an Antivirus works?
The antivirus software examines each and every
file in a computer and examines its content with
the virus definitions stored in its virus dictionary.
E.g. Avira
Kaspersky
Norton
Many more ……………
Thanks for your attention

Más contenido relacionado

La actualidad más candente (20)

Virus
VirusVirus
Virus
 
virus
virusvirus
virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similar a Virus soran university

Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxDEEP TIWARI
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxDEEP TIWARI
 

Similar a Virus soran university (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
 

Último

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 

Último (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 

Virus soran university

  • 1. UNIVERSITY OF SORAN Faculty of science & engineering School of engineering DPT of petroleum engineering VIRUS Prepared by: Harem Abdullstar Rebaz Abdullqadr Omer Muhammed Supervisor : Mr. Aras Masoud
  • 2. Contents? what's a computer virus ? Types of Viruses Categories of Viruses How do viruses work? How an Antivirus works? Conclusion
  • 3. What is a virus? A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The computer viruses can damage or corrupt data, modify existing data .
  • 4. Types of virus Boot sector Virus Master Boot Record virus (MBR) File infector virus  Multipartite virus  Macro Virus Trojan Horse  Worms Logic Bombs Polymorphic Virus
  • 5. Boot sector Virus  A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. E.g. Form, Disk Killer, Michelangelo, Stoned.
  • 6. Master Boot Record virus (MBR) MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. E.g. AntiEXE, Unashamed, NYB
  • 7. File infector virus File infector viruses infect program files. Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files. E.g. Snow.A, Jerusalem, Cascade
  • 8. Multipartite virus A multipartite virus is a virus that can infect either boot sectors or executables. When it infects a boot sector, it works as a boot sector infector. E.g. One_Half, Emperor, Anthrax, Tequilla.
  • 9. Macro Virus Macro viruses infect files that are created using certain applications or programs that contain macros. They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files. E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M. Groov.
  • 10. Trojan Horse A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. Trojan horses can be included in software that you download for free or as attachments in email messages. E.g. Trojan.Vundo. Back Orifice, NetBus, SubSeven
  • 11. Worms A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other and it may do so without any user intervention. Work of worms delete files on a host system send documents via email E.g.W32.Mydoom.AX@mm
  • 12. How do viruses work? Replicating itself Interrupting system/network use Modifying configuration settings Flashing BIOS Format hard drive/destroy data Using computer/network resources
  • 13. How an Antivirus works? The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. E.g. Avira Kaspersky Norton Many more ……………
  • 14. Thanks for your attention